Resources

Selecting Modules
Blog

How BlackMesh Helps CMS Product Owners Keep Things Secure and Compliant

Open source content management systems like Drupal, Magento and WordPress are popular options for companies today because they make it easier for IT and development teams to integrate various emerging technologies—like workflow automation tools, Kubernetes and public cloud environments—into their web applications. These open source platforms integrate new capabilities that improve the digital experience for end users or add efficiencies to internal workflows. 

Webinar

On-Demand Webinar: Automated & On-Demand Infra for Secure Environments

Technical teams serving the public sector are asked to interact with more non-technical stakeholders than ever before. Developers facing this increased demand for visibility into the development process must nevertheless maintain security and compliance.  Tugboat enables teams to create on-demand infrastructure for every Git branch or tag for end-to-end visibility throughout the entire development process. As a trusted partner of Tugboat, Contegix supports Tugboat on our FedRAMP compliant platform, allowing developers access to secure tooling and environments.

Blog

The Benefits of a Hosting Provider to Ensure Secure, Compliant WordPress Sites

WordPress is one of the most commonly used content management systems (CMSs) today, and powers about 40% of all websites, including some of the internet’s most popular webpages like The New Yorker, Reuters and Skype. This is due in part to the open source platform’s versatility: With more than 58,000 plug-ins and thousands of pre-built themes to choose from, WordPress users can build effective, customized web applications to meet their specific needs. 

Blog

How To Continuously Implement Drupal Security Updates

  Keeping on top of updates to internet software can be a laborious task for IT teams. Though critical to the security of a website or application, the processes—from tracking new releases to scheduling and running the updates—can be both time-consuming and tedious. 

productive from home
Webinar

Webinar: Top 5 ways to get the most out of Jira Service Management

Are you just getting started with Jira Service Management? Trying to decide what features you need?   We have implemented and customized dozens of Atlassian instances and would like to share with you a few of our favorite features and how we apply them. This webinar will give you a perspective of select features and the configurable options available to ensure your organization is using them efficiently.

Blog

To Block FLoC or not? Google’s new tracking technology

A lot of interest has been generated recently on the implications of Google’s new tracking technology – Federated Learning of Cohorts (FLoC).  In brief, Google is trying to reduce its dependency on cookies (or eliminate them) and instead allow the browser to assign each user tracked into an “interest cohort” – which is essentially a tag for a group of people that all share similar interests.  As a user browses the web, the browser summarizes all activity and assigns a cohort.   Advertisers are then able to target specific cohorts.

Blog

How to Maintain a Successful Agile Development Process with Atlassian Solutions 

Agile software development has become the preferred development technique among tech leaders today. Unlike traditional methods like waterfall software development, which focuses on creating tight and exact stages, agile takes a more modern, iterative approach—allowing teams to continually revisit, examine and adjust their development techniques to deliver applications that meet business requirements effectively and quickly. 

Blog

Get real-time protection to help prevent the growing number of ransomware attacks

Earlier this month the Colonial Pipeline, a 5,500 mile pipeline that supplies upwards of 45% of the gasoline to the east coast of the United States was breached and halted due to a ransomware attack. With no recovery mechanism in place, the company was forced to pay nearly $5 million dollars to regain control of their infrastructure. The attack is a harsh reminder for many organizations of the growing threat of cyber-attacks and ransomware. Sadly, hacker groups such as “DarkSide” are only increasing in numbers and the threat of ransomware is only growing in complexity and scale.